Background

The access to resources
or services located in “foreign” environments and owned by disparate
entities
is a painful process for mobile users. This is a significant deterrent
to the
ability to easily interconnect in a secure and spontaneous manner among
disparate organizations. In fact, corporate wireless networks are
generally run
with severe access policies that do not offer access to guests. Public
wireless
networks typically do not support roaming agreements, so that users
have to be
a customer of the specific network provider or to “instantly” (and
costly) buy
access.

Coalition access control encompasses mechanisms dealing with access between users
and services of
two or more different security domains. These mechanism are typically
based on contractually
or implicitly agreed collaboration between organizations. They are
targeted to
medium or long-term periods of inter-organizational coalition. Some
real
examples are supply chain management, international joint projects,
logistics
service, etc. The overhead to set up these mechanisms can be
significant, as
the access control mechanisms for resources of the participating
partners
require common inter-organizational agreements. The inter-provider
agreements
that allow users to roam across different wireless providers can be
seen as a
form of coalition access control. Work on the definition of
architecture and
protocols for inter-provider roaming is ongoing in several
standardization fora
or industry initiatives (3GPP, ETSI, ECMA, IRAP …)

Spontaneous
coalition access control
investigates access mechanisms based on informally
formed coalition
scenarios. These
informal coalition scenarios are
strongly
connected to particular contextual situations: for example
communication
sessions like calls, conferencing, and Instant Messaging (IM) or
informal physical
contacts that occur in meeting rooms, offices, and hallways. It is not
possible
to establish traditional “formal” cross-organizational agreements
within these
spontaneous coalition encounters. Anyway, access to local resources
still need
to respect corporate access policies. The
notion of spontaneous
coalition access implies an increase in the number of un-verified
access points
and presents a serious security issue. User
mobility, wireless connectivity and the widespread
diffusion of portable devices raise new challenges for ubiquitous
service
provisioning. Devices that participate in spontaneous coalition
scenarios can
introduce “new” foreign services into the environment; due to their
mobility these
device can change location changing the availability of resources and
services un-predictably.
Access control to resources is crucial to leverage the provision of
ubiquitous
services and calls for novel solutions based on various context
information,
e.g., user/device location, device properties, user needs, local
resource
visibility.

Call for Submissions

The workshop is interested in contributions
addressing areas associated with mobile and ubiquitous architectures,
infrastructure,
data and services as related to Ubiquitous
Access Control. Under the “Ubiquitous Access Control” definition,
we
encompass both the “traditional” inter-provider roaming scenarios and
the more
advanced “spontaneous coalition” scenarios. The workshop will bring
together
the more “practical” aspects of the former scenario with the more
advanced
research aspects of the latter.

Technical papers describing original, previously
unpublished research, are solicited. Tutorial paper or papers reporting
experiences
of deployed systems or demonstrators are also welcome. The papers
cannot be currently
under review by another conference or journal.

Topics include, but are not limited to the
following:

Integration of Contextual Models with Security Models.

Models for Authentication, Trust, Authorization and Access
Control in Ubiquitous Computing Environments.

Coalition Access Control Models.

Ontologies for Security Policies.

Distributed Access Control Architectures and Models.

Access
Control and Trust Models for Ubiquitous Devices

Group management for ad-hoc communities

Peer discovery in Ubiquitous Computing Environment

Architecture and protocols for inter provider roaming in
wireless networks

Click on
Register. Once you
have an account, login and click on Event List.

Scroll
down
to International
Workshop on Ubiquitous Access Control – IWUAC.

Choose the
Submit Paper Link.

Formatting guidelines

Authors should
prepare an Adobe Acrobat PDF version of their paper. Papers must
be in English and not exceed 8 pages double column in IEEE conference
format (US Letter size, 8.5 x 11 inches) including text, figures and
references. The font size must be 10 points. Please follow the IEEE
conference paper format as given in these templates: MS
Word, LaTeX
(Unix), or LaTeX
(MS Windows).
See sample
manuscript as a visual aid for formatting and styles.